
Piotr Poltorak
Examiner (ID: 10310)
| Most Active Art Unit | 2433 |
| Art Unit(s) | 2134, 2434, 2496, 2433 |
| Total Applications | 845 |
| Issued Applications | 607 |
| Pending Applications | 51 |
| Abandoned Applications | 200 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 6204314
[patent_doc_number] => 20110067100
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-17
[patent_title] => 'JOB PROCESSING SYSTEM AND IMAGE PROCESSING APPARATUS'
[patent_app_type] => utility
[patent_app_number] => 12/880214
[patent_app_country] => US
[patent_app_date] => 2010-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 15764
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0067/20110067100.pdf
[firstpage_image] =>[orig_patent_app_number] => 12880214
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/880214 | Job processing system and image processing apparatus | Sep 12, 2010 | Issued |
Array
(
[id] => 8924208
[patent_doc_number] => 08490158
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-07-16
[patent_title] => 'Firewall including local bus'
[patent_app_type] => utility
[patent_app_number] => 12/837271
[patent_app_country] => US
[patent_app_date] => 2010-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6916
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12837271
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/837271 | Firewall including local bus | Jul 14, 2010 | Issued |
Array
(
[id] => 7671551
[patent_doc_number] => 20110320820
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-29
[patent_title] => 'Restoring Secure Sessions'
[patent_app_type] => utility
[patent_app_number] => 12/821355
[patent_app_country] => US
[patent_app_date] => 2010-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10187
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12821355
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/821355 | Restoring secure sessions | Jun 22, 2010 | Issued |
Array
(
[id] => 5977447
[patent_doc_number] => 20110154489
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-23
[patent_title] => 'SYSTEM FOR ANALYZING MALICIOUS BOTNET ACTIVITY IN REAL TIME'
[patent_app_type] => utility
[patent_app_number] => 12/821576
[patent_app_country] => US
[patent_app_date] => 2010-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6128
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20110154489.pdf
[firstpage_image] =>[orig_patent_app_number] => 12821576
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/821576 | SYSTEM FOR ANALYZING MALICIOUS BOTNET ACTIVITY IN REAL TIME | Jun 22, 2010 | Abandoned |
Array
(
[id] => 7671540
[patent_doc_number] => 20110320809
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-12-29
[patent_title] => 'METHOD AND APPARATUS FOR KEY REVOCATION IN AN ATTRIBUTE-BASED ENCRYPTION SCHEME'
[patent_app_type] => utility
[patent_app_number] => 12/821528
[patent_app_country] => US
[patent_app_date] => 2010-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5116
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12821528
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/821528 | Method and apparatus for key revocation in an attribute-based encryption scheme | Jun 22, 2010 | Issued |
Array
(
[id] => 5977450
[patent_doc_number] => 20110154492
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-06-23
[patent_title] => 'MALICIOUS TRAFFIC ISOLATION SYSTEM AND METHOD USING BOTNET INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 12/821549
[patent_app_country] => US
[patent_app_date] => 2010-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 29
[patent_no_of_words] => 7753
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0154/20110154492.pdf
[firstpage_image] =>[orig_patent_app_number] => 12821549
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/821549 | MALICIOUS TRAFFIC ISOLATION SYSTEM AND METHOD USING BOTNET INFORMATION | Jun 22, 2010 | Abandoned |
Array
(
[id] => 6281941
[patent_doc_number] => 20100257586
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-10-07
[patent_title] => 'Projector projecting password'
[patent_app_type] => utility
[patent_app_number] => 12/801623
[patent_app_country] => US
[patent_app_date] => 2010-06-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3144
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0257/20100257586.pdf
[firstpage_image] =>[orig_patent_app_number] => 12801623
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/801623 | Projector projecting password | Jun 16, 2010 | Issued |
Array
(
[id] => 6585298
[patent_doc_number] => 20100235644
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-09-16
[patent_title] => 'Method and System for a Recursive Security Protocol for Digital Copyright Control'
[patent_app_type] => utility
[patent_app_number] => 12/788516
[patent_app_country] => US
[patent_app_date] => 2010-05-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 17970
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20100235644.pdf
[firstpage_image] =>[orig_patent_app_number] => 12788516
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/788516 | Method and system for a recursive security protocol for digital copyright control | May 26, 2010 | Issued |
Array
(
[id] => 8308687
[patent_doc_number] => 08230236
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-07-24
[patent_title] => 'Secure digital content distribution system and secure hard drive'
[patent_app_type] => utility
[patent_app_number] => 12/685344
[patent_app_country] => US
[patent_app_date] => 2010-01-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 10
[patent_no_of_words] => 3883
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12685344
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/685344 | Secure digital content distribution system and secure hard drive | Jan 10, 2010 | Issued |
Array
(
[id] => 7684053
[patent_doc_number] => 20100122088
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-05-13
[patent_title] => 'METHOD AND SYSTEM FOR CONTROL OF CODE EXECUTION ON A GENERAL PURPOSE COMPUTING DEVICE AND CONTROL OF CODE EXECUTION IN A RECURSIVE SECURITY PROTOCOL'
[patent_app_type] => utility
[patent_app_number] => 12/615843
[patent_app_country] => US
[patent_app_date] => 2009-11-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 22839
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0122/20100122088.pdf
[firstpage_image] =>[orig_patent_app_number] => 12615843
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/615843 | Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol | Nov 9, 2009 | Issued |
Array
(
[id] => 6649378
[patent_doc_number] => 20100037294
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-02-11
[patent_title] => 'METHOD AND APPARATUS FOR PROVIDING A HIERARCHICHAL SECURITY PROFILE OBJECT'
[patent_app_type] => utility
[patent_app_number] => 12/603323
[patent_app_country] => US
[patent_app_date] => 2009-10-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4188
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0037/20100037294.pdf
[firstpage_image] =>[orig_patent_app_number] => 12603323
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/603323 | METHOD AND APPARATUS FOR PROVIDING A HIERARCHICHAL SECURITY PROFILE OBJECT | Oct 20, 2009 | Abandoned |
Array
(
[id] => 6511385
[patent_doc_number] => 20100095134
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-15
[patent_title] => 'PROGRAMMING NON-VOLATILE MEMORY IN A SECURE PROCESSOR'
[patent_app_type] => utility
[patent_app_number] => 12/576904
[patent_app_country] => US
[patent_app_date] => 2009-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5785
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0095/20100095134.pdf
[firstpage_image] =>[orig_patent_app_number] => 12576904
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/576904 | Programming non-volatile memory in a secure processor | Oct 8, 2009 | Issued |
Array
(
[id] => 6511290
[patent_doc_number] => 20100095125
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-15
[patent_title] => 'CERTIFICATE VERIFICATION'
[patent_app_type] => utility
[patent_app_number] => 12/576344
[patent_app_country] => US
[patent_app_date] => 2009-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5813
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0095/20100095125.pdf
[firstpage_image] =>[orig_patent_app_number] => 12576344
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/576344 | Certificate verification | Oct 8, 2009 | Issued |
Array
(
[id] => 9781292
[patent_doc_number] => 08856513
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-10-07
[patent_title] => 'Programming on-chip non-volatile memory in a secure processor using a sequence number'
[patent_app_type] => utility
[patent_app_number] => 12/576356
[patent_app_country] => US
[patent_app_date] => 2009-10-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5801
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 185
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12576356
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/576356 | Programming on-chip non-volatile memory in a secure processor using a sequence number | Oct 8, 2009 | Issued |
Array
(
[id] => 6630994
[patent_doc_number] => 20100100930
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-22
[patent_title] => 'HOSTED VULNERABILITY MANAGEMENT FOR WIRELESS DEVICES'
[patent_app_type] => utility
[patent_app_number] => 12/574701
[patent_app_country] => US
[patent_app_date] => 2009-10-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 37
[patent_figures_cnt] => 37
[patent_no_of_words] => 24952
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0100/20100100930.pdf
[firstpage_image] =>[orig_patent_app_number] => 12574701
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/574701 | HOSTED VULNERABILITY MANAGEMENT FOR WIRELESS DEVICES | Oct 6, 2009 | Abandoned |
Array
(
[id] => 9999260
[patent_doc_number] => 09043877
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-05-26
[patent_title] => 'Temporarily providing higher privileges for computing system to user identifier'
[patent_app_type] => utility
[patent_app_number] => 12/574562
[patent_app_country] => US
[patent_app_date] => 2009-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5502
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12574562
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/574562 | Temporarily providing higher privileges for computing system to user identifier | Oct 5, 2009 | Issued |
Array
(
[id] => 6031647
[patent_doc_number] => 20110055580
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-03
[patent_title] => 'NONCE GENERATION'
[patent_app_type] => utility
[patent_app_number] => 12/574090
[patent_app_country] => US
[patent_app_date] => 2009-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 16018
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0055/20110055580.pdf
[firstpage_image] =>[orig_patent_app_number] => 12574090
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/574090 | Nonce generation | Oct 5, 2009 | Issued |
Array
(
[id] => 10854521
[patent_doc_number] => 08881234
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-11-04
[patent_title] => 'Host state monitoring'
[patent_app_type] => utility
[patent_app_number] => 12/574120
[patent_app_country] => US
[patent_app_date] => 2009-10-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 14
[patent_no_of_words] => 16018
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 323
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12574120
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/574120 | Host state monitoring | Oct 5, 2009 | Issued |
Array
(
[id] => 6035998
[patent_doc_number] => 20110083015
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-04-07
[patent_title] => 'SYSTEM AND METHOD FOR AN ELECTRONIC SIGNATURE FOR QUICK AND EFFICIENT DATA AUTHENTICATION'
[patent_app_type] => utility
[patent_app_number] => 12/573596
[patent_app_country] => US
[patent_app_date] => 2009-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8302
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0083/20110083015.pdf
[firstpage_image] =>[orig_patent_app_number] => 12573596
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/573596 | SYSTEM AND METHOD FOR AN ELECTRONIC SIGNATURE FOR QUICK AND EFFICIENT DATA AUTHENTICATION | Oct 4, 2009 | Abandoned |
Array
(
[id] => 6631045
[patent_doc_number] => 20100100936
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-04-22
[patent_title] => 'Secure Wireless Network Using Radiometric Signatures'
[patent_app_type] => utility
[patent_app_number] => 12/555369
[patent_app_country] => US
[patent_app_date] => 2009-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7359
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0100/20100100936.pdf
[firstpage_image] =>[orig_patent_app_number] => 12555369
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/555369 | Secure Wireless Network Using Radiometric Signatures | Sep 7, 2009 | Abandoned |